tencent cloud

TencentDB for PostgreSQL

Release Notes and Announcements
Release Notes
Product Announcements
Product Introduction
Overview
Features
Strengths
Scenarios
Information Security
Regions and AZs
Product Feature List
Large version lifecycle description
MSSQL Compatible Version
Billing
Billing Overview
Instance Type and Specification
Purchase Methods
Refund
Overdue Payments
Backup Space Billing
Database Audit Billing Overview
Getting Started
Creating TencentDB for PostgreSQL Instance
Connecting to TencentDB for PostgreSQL Instance
Managing TencentDB for PostgreSQL Instance
Importing Data
Migrating Data with DTS
Kernel Version Introduction
Kernel Version Overview
Kernel Version Release Notes
Viewing Kernel Version
Proprietary Kernel Features
Database Audit
Audit Service Description
Activating Audit Service
View Audit Logs
Modify audit services
Audit Performance Description
User Guide
Instance Management
Upgrading Instance
CPU Elastic Scaling
Read-Only Instance
Account Management
Database Management
Parameter Management
Log Management and Analysis
Backup and Restoration
Data Migration
Extension Management
Network Management
Access Management
Data Security
Tenant and Resource Isolation
Security Groups
Monitoring and Alarms
Tag
AI Practice
Using the Tencentdb_ai Plug-In to Call Large Models
Building Ai Applications with the Tencentdb Ai Plug-In
Combining Supabase to Quickly Build Backend Service Based on TencentDB for PostgreSQL
Use Cases
postgres_fdw Extension for Cross-database Access
Automatically Creating Partition in PostgreSQL
Searching in High Numbers of Tags Based on pg_roaringbitmap
Querying People Nearby with One SQL Statement
Configuring TencentDB for PostgreSQL as GitLab's External Data Source
Supporting Tiered Storage Based on cos_fdw Extension
Implement Read/Write Separation via pgpool
Implementing Slow SQL Analysis Using the Auto_explain Plugin
Using pglogical for Logical Replication
Using Debezium to Collect PostgreSQL Data
Set Up a Remote Disaster Recovery Environment for PostgreSQL Locally on CVM
Read-Only Instance and Read-Only Group Practical Tutorial
How to Use SCF for Scheduled Database Operations
Fix Table Bloat
Performance White Paper
Test Methods
Test Results
API Documentation
History
Introduction
API Category
Making API Requests
Instance APIs
Read-only Replica APIs
Backup and Recovery APIs
Parameter Management APIs
Security Group APIs
Performance Optimization APIs
Account APIs
Specification APIs
Network APIs
Data Types
Error Codes
FAQs
Service Agreement
Service Level Agreement
Terms of Service
Glossary
Contact Us

Enabling Public Network Address

PDF
Mode fokus
Ukuran font
Terakhir diperbarui: 2025-04-23 21:44:46
TencentDB for PostgreSQL supports private and public network addresses. By default, a private network address is provided for you to access your instance over the private network. If you want to enable public network access, you can enable it in the console to build a public network address.
Note:
Currently, the Beijing, Chengdu, Guangzhou, Hong Kong (China), Nanjing, Shanghai, Tokyo, and Silicon Valley regions support the public network feature and support enabling the public network address through the console.
Note: There are risks of attacks once the public network is enabled. Operate with caution.
To enable the public network address, you need to configure security group rules to access it.

Enabling Public Network Address in Console

Note:
Failures occurring during public network access will not be included in the overall availability calculation of the TencentDB for PostgreSQL service.
Access over public network reduces instance security. It is only recommended for management, database testing, or auxiliary management. No availability SLA guarantee is provided. Use private network for business access.
Recommend you use the public network domain name instead of the IP for access. Because adjustment of database instance specifications, reactivation of the public network, and network upgrades may cause changes to the public network IP. Using the public network domain name for access can ensure minimal impact on business and eliminates the need to modify the application.
1. Log in to the TencentDB for PostgreSQL console and select the region. In the instance list, click the Instance ID or Manage in the Operation column to enter the instance management page.
2. On the Instance Details page, click Enable in Basic Info > Public IPv4 Address.

3. In the pop-up window, read the notes and click OK.
4. After the instance status is updated to Running, you can view the public network address on the instance details page.

Configure a TencentDB for PostgreSQL security group

1. Log in to the TencentDB for PostgreSQL console and select the region. In the instance list, click the Instance ID or Manage in the Operation column to enter the instance management page.
2. On the instance management page, select the Security Group tab, click Configure Security Group, configure the security group rule to open all ports, and confirm that the security group allows access from public IPs. For more information on configuration, see Managing Security Groups.


Check public network connectivity

You can use a client tool to access TencentDB for PostgreSQL. For detailed directions, see Connecting to PostgreSQL Instances.

Bantuan dan Dukungan

Apakah halaman ini membantu?

masukan